Correlation mining has gained great success in many application domains for its ability to capture underlying dependencies between objects. However, research on correlation mining ...
The focus of the research described in this paper is on the nature of the event information provided in commonly available computer and other logs and the extent to which it is po...
This paper is part 6 in a series of papers about the Discrete Fourier Transform (DFT) and the Inverse Discrete Fourier Transform (IDFT). The focus of this paper is on correlation....
— We characterize the statistical properties of the mutual information between the transmitter and the receiver of a multiple-input multiple-output (MIMO) communication system in...
: Network intrusion detection sensors are usually built around low level models of network traffic. This means that their output is of a similarly low level and as a consequence, ...